What do we need to know about the CPU exploits Meltdown and Spectre?

Credit to Author: Quick Heal Security Labs| Date: Thu, 04 Jan 2018 13:02:09 +0000

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected system/product for their profit in various ways. What is an exploit? Exploits…

Read more

What do we need to know about the CPU vulnerabilities Meltdown and Spectre?

Credit to Author: Quick Heal Security Labs| Date: Thu, 04 Jan 2018 13:02:09 +0000

What exactly is a vulnerability? A security vulnerability (also known as a security hole) is a security flaw detected in a product that may leave it open to hackers and malware. Using such vulnerabilities, attackers can exploit the affected system/product for their profit in various ways. What is an exploit? Exploits…

Read more

Cybersecurity Predictions: What to expect in 2018

Credit to Author: Rajib Singha| Date: Tue, 26 Dec 2017 13:08:50 +0000

At the risk of being pessimistic, I’d say that 2017 wasn’t such as a great year for cybersecurity. Why? Well, where do I begin? Before we get on with the cybersecurity predictions for 2018, let’s take a quick flashback of 2017 2017 was riddled with cybersecurity mayhems: WannaCry – the…

Read more

Cybersecurity Predictions: What to expect in 2018?

Credit to Author: Rajib Singha| Date: Tue, 26 Dec 2017 13:08:50 +0000

At the risk of being pessimistic, I’d say that 2017 wasn’t such as a great year for cybersecurity. Why? Well, where do I begin? 2017 – a quick flashback 2017 was riddled with cybersecurity mayhems: WannaCry – the biggest ransomware attack in history; took down over 300,000 computers worldwide, closely…

Read more

Want to scam an online scammer? Here’s how you can do it with Re:scam

Credit to Author: Rajib Singha| Date: Wed, 15 Nov 2017 14:28:12 +0000

How many times have you received an email congratulating you about winning a lottery of $1 Million or that your bank account will be suspended unless you take an action like clicking on a link to update your bank details? I’d guess, at least once in your lifetime. And even…

The post Want to scam an online scammer? Here’s how you can do it with Re:scam appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more

Malspam Campaign using CVE-2017-0199 Targets Manufacturing, Pharmaceutical, and other important Industries

Credit to Author: Quick Heal Security Labs| Date: Thu, 31 Aug 2017 08:39:49 +0000

Quick Heal Security Labs has come across various email campaigns that are actively exploiting the famous vulnerability CVE-2017-0199 in their bid to target prominent private industries in India. CVE-2017-0199 was a zero-day vulnerability reported in April 2017 by two different security firms. Almost all of the MS Office versions were…

The post Malspam Campaign using CVE-2017-0199 Targets Manufacturing, Pharmaceutical, and other important Industries appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more

Parents, here are 5 things you must know about the Blue Whale Challenge

Credit to Author: Rajib Singha| Date: Thu, 24 Aug 2017 15:15:47 +0000

If you are a parent and you don’t know anything about the Blue Whale Challenge, then it’s important that you do. What is the Blue Whale Challenge? The Blue Whale Challenge is supposedly an Internet game where players are assigned 50 different tasks by the game admin (also known as…

The post Parents, here are 5 things you must know about the Blue Whale Challenge appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more

Just hovering your computer mouse over a hyperlink can get your computer infected

Credit to Author: Quick Heal Security Labs| Date: Wed, 21 Jun 2017 09:46:49 +0000

In a new kind of attack, cybercriminals are infecting computers with a banking Trojan simply by fooling users into hovering over a link embedded in a malicious PowerPoint file. Attackers are sending malicious PowerPoint Show (PPS) or Open XML Slide Show (PPSX) to users via spam emails. These files only…

The post Just hovering your computer mouse over a hyperlink can get your computer infected appeared first on Quick Heal Technologies Security Blog | Latest computer security news, tips, and advice.

Read more